The (ISC)2 Foundation’s U.S.A. Cyber Warrior Scholarship is just one of many scholarships that will give veterans certifications to accredit the IT knowledge they acquired during military service, opening the door to technology professions and helping turn veterans into cybersecurity experts.
“These men and women are some of the highest-skilled, best-trained, hardest-working people in this country. They are medics and engineers, drivers and welders, computer technicians and machinists. They are eager to work and determined to keep on serving this country. All they need is a chance.”
There is still a huge gap, however, between the number of businesses, organizations, and federal agencies that acknowledge a cybersecurity strategy and the number that have successfully implemented one, even though the importance of being cyber secure is widely recognized.
According to the Cisco 2014 Annual Security Report, there were one million unfilled cyber security jobs globally, and according to a recent report on the IT security workforce, 56% of professionals feel their departments are understaffed. The push for a cybersecurity workforce is growing exponentially and organizations are under increasing pressure to take dramatic steps towards protecting their data, which involves implementing an information security management system (ISMS).
Alan Calder, founder and executive chairman of IT Governance, recently said: “The cyber threat environment is constantly changing and we all must be proactive to respond to these changes. Dealing with information security from a proactive point of view will ensure organizations can continue to thrive even in an environment marked by increasing cyber crime.”
ISO27001 is the international standard that specifies requirements for an ISMS and, according to the latest ISO27001 survey, certification to this standard increased by 32% in the USA from 2011 to 2012.
Calder continues, “If understood and implemented correctly, ISO27001 can help to rationalise security expenditure and reduce the impact of cyber crime, while giving a business a competitive edge.”
For further information on cybersecurity training or leveraging our expertise to protect your information assets, IT Governance’s four structured solutions enable any organization to implement ISO27001 at a speed and budget that is appropriate for your individual needs and preferred project approach. Find out more >>